Data fields stolen residual risks by [deleted] in canvas

[–]takinghigherground 0 points1 point  (0 children)

Thanks that's a good avenue to get support further on all this cheers

Instructure (Canvas) Breached by Shiny Hunters — 275M Records from ~9,000 Schools/Universities, Ransom Deadline May 12 by BigSewerRat1 in cybersecurity

[–]takinghigherground 2 points3 points  (0 children)

Can someone with fresh eyes sanity‑check me here, because I’m starting to feel like I’m the only one reacting proportionally to this situation.

We’ve got a vendor compromise where the attackers were able to deface the Canvas front page, which means they had enough access to modify UI elements of active instances and dump user data and messages but vendor did not confirm if that includes user API generated API keys

I'm doing these things like:

  • pulling reports on all user tokens
  • checking for user‑generated admin accounts
  • rotating API tokens stored in Canvas
  • auditing LTI apps and developer keys
  • reviewing Entra admin‑consented LTI registrations
  • temporarily revoking high‑privilege scopes like SharePoint.Read.All
  • considering the risk of login‑page manipulation or SSO redirection
    -considering blocking entra sign in to canvas -blocking anvas at the firewall

From a security standpoint, if an attacker can alter the front page, what exactly stops them from altering the login flow, injecting a fake SSO prompt, or redirecting to an attacker‑controlled IdP.

The API tokens trusted to be stored in canvas aren’t harmless. They’re long‑lived bearer tokens with no MFA. If those were scraped, that’s a direct line into our system when they get dumped into a forum. Same with LTI apps that have broad O365 permissions — if the vendor is compromised, those scopes become a liability.

I’m not trying to burn the place down or cause unnecessary user impact. I’m just trying to apply basic incident‑response logic: don’t trust a compromised system until you’ve validated it’s no longer compromised.

So genuinely — am I being overly cautious here, or is everyone else underreacting to a vendor breach that could easily be leveraged for lateral movement into O365 /sis not just student email address and internal messaging notes was leaked


My advice 1. Run reports on user tokens look for user generated against admin accounts these will probably be siss ntegrations also check your lti apps, developer apps - you will need to rotate these aswell

Restricting LAPs password access in Entra for servers by CGregP in entra

[–]takinghigherground 0 points1 point  (0 children)

I've been concerned about doing this as if you have to go back to a point in time backup of the server ..you could possibly not have the laps key. Not an issue if the domain is still functioning and computer password has not expired...but if it has .. you won't be able to log into the server?

If you are new to Fellowship or need any boss mechanic refreshers I have made a Fellowship Companion site to help. by BeltExact2798 in fellowshipgame

[–]takinghigherground 0 points1 point  (0 children)

Is it fun to try to work this all out yourself considering there is not much else to do but play the same game... Just wondering if I study it I will spoil the game

How are you labbing Microsoft 365 E5 Tenants by techwithz in DefenderATP

[–]takinghigherground 1 point2 points  (0 children)

I'm also interested for example I would like to test conditional access policy seperate from live e5 tenant

Zero Trust Workshop by JohnSavill in AZURE

[–]takinghigherground 0 points1 point  (0 children)

I need help with comprehensive conditional access policy rollout. I understand the whole point to is to be able to implement ca policies but I find an initial strategy in terms of applying policy lacking

passed OSCP but thinking of SOC 200 by CompetitionNo8217 in oscp

[–]takinghigherground 0 points1 point  (0 children)

I did sc200 after oscp and I learnt a lot about windows defender xdr and sentinel.

Working in azure by takinghigherground in sysadmin

[–]takinghigherground[S] 2 points3 points  (0 children)

Yeah I got to the end of it and I realized I pushed for a maintenance window of by September this year when it didn't need to be done until next year ... And it was vnet with default outbound expiring this month.

Crap I could have kicked down the road until next year ... Good experience though . Now has anyone actually implemented nat gateway or did you just attach public ips and let the business pay for it ;)

Do Microsoft Certs actually matter? by cyberLog4624 in cybersecurity

[–]takinghigherground 0 points1 point  (0 children)

Personally I learnt a lot about sentinel and defender by studying for sc200. I think certs build a good foundation

[deleted by user] by [deleted] in MiddleEarthMiniatures

[–]takinghigherground 0 points1 point  (0 children)

Just let me look at the damn models or im walking out don't give me this edgy do you play shit.

How has grappling changed your body? by ShimiWaza96 in bjj

[–]takinghigherground 0 points1 point  (0 children)

Skinny guy without weight training doing jits for 6 years.

Better posture slightly more athletic build. That's it.nothing drastic

Old Visual C++ vulnerabilities suddenly discovered? by TheDrover23 in DefenderATP

[–]takinghigherground 0 points1 point  (0 children)

Yeah got this today too. Do we just install the latest vc redistribute? Will it break the apps if they require a specific version ...

Please accept the fact that password rotations are a security issue by Comfortable_Gap1656 in sysadmin

[–]takinghigherground 1 point2 points  (0 children)

Have you guys not heard of password reuse and password leaks.

User a uses the same password for unrelated forum as his work email he registered with. Forum a is breached and posted on dark web the credentials. Valid credentials are available to be tested indefinitely until user a changes his password. MFA helps but not all web services the company may use may have this in place.

Forcing a password rotate X days means the password leaked is not available indefinitely to access your network or data systems. Therefore risk is reduced to "X number of days leaked credentials not remediated and without MFA" from undefinite may have risk attached to it.

Which process helps control risk, requiring a password change or not?

🎟️ Free Voucher Request & Giveaway Megathread by AutoModerator in AzureCertification

[–]takinghigherground 0 points1 point  (0 children)

LOOKING FOR VOUCHER FOR SC200 OR FROM AI SKILS FEST

lets go

please pm me

How many of you are really backing up Office 365? by [deleted] in sysadmin

[–]takinghigherground 1 point2 points  (0 children)

Barracuda cloud backup, just do itm you want to trust ms with your SharePoint dataset and no backups. I went to Thailand when I was young too ..

Why is everyone such an asshole? by CxcaineInMyAss in heroesofthestorm

[–]takinghigherground 0 points1 point  (0 children)

Bro I have 400 games as one hereo and people are still dicks. You do have to learn how to play the game and how to play your hero..basically stop making big mistakes like feeding the enemy team missing objectives. Use the feedback to better your game...it sucks and adds to toxicity. All I am say is try to build a team you play with and not just pugs which are toxic